EasyManua.ls Logo

Siemens SCALANCE XR528-6M

Siemens SCALANCE XR528-6M
112 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Safety notes
2.1 Security recommendations
SCALANCE XR-500
Operating Instructions, 05/2017, A5E03275845-11
11
Safety notices when using the device according to Hazardous Locations (HazLoc)
If you use the device under HazLoc conditions you must also keep to the following safety
notices in addition to the general safety notices for protection against explosion:
This equipment is suitable for use in Class I, Division 2, Groups A, B, C and D or non-
hazardous locations only.
This equipment is suitable for use in Class I, Zone 2, Group IIC or non-hazardous locations
only.
2.1
Security recommendations
NOTICE
Information security
Connect to the device and change the standard password for the user set in the factory
"admin" and "" before you operate the device.
To prevent unauthorized access, note the following security recommendations.
General
You should make regular checks to make sure that the device meets these
recommendations and/or other security guidelines.
Evaluate your plant as a whole in terms of security. Use a cell protection concept with
suitable products (http://www.industry.siemens.com/topics/global/en/industrial-
security/network-security/Pages/Default.aspx).
When the internal and external network are disconnected, an attacker cannot access
internal data from the outside. Therefore operate the device only within a protected
network area.
For communication via non-secure networks use additional devices with VPN functionality
to encrypt and authenticate the communication.
Terminate management connections correctly (WBM. Telnet, SSH etc.).
Physical access
Restrict physical access to the device to qualified personnel.
The memory card or the PLUG (C-PLUG, KEY-PLUG) contains sensitive data such as
certificates, keys etc. that can be read out and modified.
Using the button, you can reset the device to the factory defaults.
If the device is publicly accessible, disable the functions of the button using the software.
Lock unused physical ports on the device. Unused ports can be used to gain forbidden
access to the plant.

Table of Contents

Related product manuals